2019
DOI: 10.1109/jiot.2019.2923373
|View full text |Cite
|
Sign up to set email alerts
|

A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 124 publications
(73 citation statements)
references
References 49 publications
0
73
0
Order By: Relevance
“…Furthermore, we use the stronger threat model, known as the "Canetti and Krawczyk's (CK) adversary model" [10], wherein the adversary A, in addition to having all capacities of the DY-therat model, can also compromise ephemeral information like session-specific states and keys. Thus, in the presence of the CK-adversary, a user authentication scheme must be designed such that leakage of ephemeral secrets should have minimal impact on the security of unrelated entities in the authenticated key-exchange scheme [11].…”
Section: Network and Threat Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, we use the stronger threat model, known as the "Canetti and Krawczyk's (CK) adversary model" [10], wherein the adversary A, in addition to having all capacities of the DY-therat model, can also compromise ephemeral information like session-specific states and keys. Thus, in the presence of the CK-adversary, a user authentication scheme must be designed such that leakage of ephemeral secrets should have minimal impact on the security of unrelated entities in the authenticated key-exchange scheme [11].…”
Section: Network and Threat Modelsmentioning
confidence: 99%
“…Proof. We design our proof on the lines of the proofs that presented in [11,31,32]. Four sequential games, say G i , i ∈ [0 − 3], are played.…”
Section: Formal Security Analysis Through Real-or-random Modelmentioning
confidence: 99%
“…Besides, due to limited battery life of IoT devices, it is significant to design lightweight authentication mechanism. Many lightweight protocols [16], [17] were proposed by using of bitwise XOR and hash operations. Additionally, compared with two-factor authentication protocols, threefactor authentication protocol using users' smart cards, pass-words and biometrics can provide strong security against some attacks, such as stolen-smartcard attacks and passwordguessing attacks.…”
Section: A Motivationsmentioning
confidence: 99%
“…ROR model: There are three communication participants including GW N , S j , U i in this protocol. The model considers the followings [16].…”
Section: A Formal Security Analysis Based On Real-or-random Modelmentioning
confidence: 99%
See 1 more Smart Citation